Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe

Overview

General Information

Sample name:17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe
Analysis ID:1561552
MD5:49dc4ee55a1efd095a37979f88b9080c
SHA1:fedf426141c227a67df1dcde19182abc46cac369
SHA256:1896c48f7355a6d6f54df73e79e1176a069f2df15a7afb09f77974fd4d08cf5e
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

XWorm
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected XWorm
Machine Learning detection for sample
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

No configs have been found
SourceRuleDescriptionAuthorStrings
17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeJoeSecurity_XWormYara detected XWormJoe Security
    17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x7b38:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x7bd5:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x7cea:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x77e6:$cnc4: POST / HTTP/1.1
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeJoe Sandbox ML: detected
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: tse1.mm.bing.net

    System Summary

    barindex
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeBinary or memory string: OriginalFilenamegangster90x.exe4 vs 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
    Source: classification engineClassification label: mal60.troj.winEXE@0/0@1/0
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System1
    Non-Application Layer Protocol
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    bg.microsoft.map.fastly.net
    199.232.214.172
    truefalse
      high
      s-part-0035.t-0009.t-msedge.net
      13.107.246.63
      truefalse
        high
        ax-0001.ax-msedge.net
        150.171.27.10
        truefalse
          high
          tse1.mm.bing.net
          unknown
          unknownfalse
            high
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1561552
            Start date and time:2024-11-23 18:28:07 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 1m 42s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:2
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe
            Detection:MAL
            Classification:mal60.troj.winEXE@0/0@1/0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Unable to launch sample, stop analysis
            • No process behavior to analyse as no analysis process or sample was found
            • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Excluded IPs from analysis (whitelisted): 20.198.118.190
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, wns.notify.trafficmanager.net, ocsp.digicert.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, mm-mm.bing.net.trafficmanager.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, ctldl.windowsupdate.com, arc.msn.com, wu-b-net.trafficmanager.net
            • VT rate limit hit for: 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe
            No simulations
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ax-0001.ax-msedge.nethttps://myqrcode.mobi/qr/3c3aa5e1/viewGet hashmaliciousUnknownBrowse
            • 150.171.27.10
            file.exeGet hashmaliciousCredential FlusherBrowse
            • 150.171.27.10
            file.exeGet hashmaliciousStealcBrowse
            • 150.171.27.10
            decode_8dad31e2f9be3de071939da6e14b6f6e8366fd10a6e77ff91ad879dc0abe6334.exeGet hashmaliciousPureLog StealerBrowse
            • 150.171.28.10
            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
            • 150.171.28.10
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 150.171.28.10
            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
            • 150.171.27.10
            SeT_up.exeGet hashmaliciousLummaC StealerBrowse
            • 150.171.27.10
            https://clearview-ps.inwise.net/Page_11-21-2024_1Get hashmaliciousHTMLPhisherBrowse
            • 150.171.27.10
            LRkZCtzQ3.ps1Get hashmaliciousUnknownBrowse
            • 150.171.27.10
            s-part-0035.t-0009.t-msedge.netfile.exeGet hashmaliciousLummaC StealerBrowse
            • 13.107.246.63
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 13.107.246.63
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 13.107.246.63
            file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
            • 13.107.246.63
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 13.107.246.63
            21Installer.exeGet hashmaliciousStealc, VidarBrowse
            • 13.107.246.63
            file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
            • 13.107.246.63
            file.exeGet hashmaliciousCredential FlusherBrowse
            • 13.107.246.63
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 13.107.246.63
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 13.107.246.63
            bg.microsoft.map.fastly.netfile.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
            • 199.232.210.172
            download.ps1Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            download.ps1Get hashmaliciousUnknownBrowse
            • 146.75.30.172
            download.ps1Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            download.ps1Get hashmaliciousUnknownBrowse
            • 199.232.214.172
            download.ps1Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            file.exeGet hashmaliciousCredential FlusherBrowse
            • 199.232.214.172
            LRkZCtzQ3.ps1Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            file.exeGet hashmaliciousRedLine, SectopRATBrowse
            • 199.232.214.172
            filepdf.pdf.lnk.download.lnkGet hashmaliciousUnknownBrowse
            • 199.232.214.172
            No context
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.624513020147386
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            • Win32 Executable (generic) a (10002005/4) 49.75%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Windows Screen Saver (13104/52) 0.07%
            • Generic Win/DOS Executable (2004/3) 0.01%
            File name:17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe
            File size:37'287 bytes
            MD5:49dc4ee55a1efd095a37979f88b9080c
            SHA1:fedf426141c227a67df1dcde19182abc46cac369
            SHA256:1896c48f7355a6d6f54df73e79e1176a069f2df15a7afb09f77974fd4d08cf5e
            SHA512:d9d040c466d3f7194141038b35b660266de86b7432bb3f3543673a014498932bb4ffb6d295f2c7524dd654074d2ed7804afa68a1ee64740b88b72f80ceb180f3
            SSDEEP:384:J3iSuXGyOjxOpBu7LoSfLWrd5SfFLWAvPeNgJ0wpkFMAfNLT2OZwxcV2v99IkHEn:N3uX+vDWJbcQFm9YHOMhSk8A1
            TLSH:ACF25C087F944317CAEEAFF1647361131630E217D913E75E88E88A9A3F37B848D457A6
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..../6g............................N.... ........@.. ....................................@................................
            Icon Hash:00928e8e8686b000
            Entrypoint:0x40a54e
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x67362FC0 [Thu Nov 14 17:13:36 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:
            Instruction
            adc dh, byte ptr [ecx]
            add eax, dword ptr [edi]
            pop es
            add al, 0Eh
            adc dh, byte ptr [ecx]
            or byte ptr [eax], cl
            push es
            adc byte ptr [ecx], al
            add dword ptr [eax], ecx
            push ds
            add byte ptr [edx+ecx], al
            add dword ptr [ecx], edx
            inc eax
            push es
            and byte ptr [ecx], al
            adc dword ptr [ecx], edi
            adc dword ptr [ecx], edi
            add al, 07h
            add bl, byte ptr [eax+ecx]
            push es
            pop es
            add ecx, dword ptr [esi]
            adc dh, byte ptr [ecx]
            sbb byte ptr [edi+eax], al
            add dword ptr [01200505h], ebx
            push cs
            sbb eax, 02070505h
            push cs
            sbb eax, 07070E1Ch
            sbb eax, 82120E05h
            sub dword ptr [edx], edx
            xor dword ptr [04051D08h], eax
            push es
            adc al, byte ptr [ecx+02200991h]
            adc al, byte ptr [ecx-7DEEF16Fh]
            push ebp
            or byte ptr [eax], ah
            add eax, dword ptr [ecx]
            push cs
            sbb al, 11h
            sbb byte ptr [ecx+09h], 00000007h
            add eax, dword ptr [edx]
            adc al, byte ptr [ecx-667FED6Fh]
            push es
            and byte ptr [ecx], al
            adc al, byte ptr [ecx+070B0E91h]
            add al, 1Dh
            add eax, 1C918112h
            adc al, byte ptr [eax+02000699h]
            sbb al, 1Ch
            adc dl, byte ptr [08020006h]
            sbb eax, 20090805h
            add al, byte ptr [ecx]
            adc al, byte ptr [ecx+6582113Dh]
            adc byte ptr [edi], al
            or dword ptr [1D1C1C05h], ebx
            add eax, 1C1D1C1Ch
            sbb eax, 05021D1Ch
            add byte ptr [ecx], al
            sbb eax, 070D0805h
            pop es
            sbb eax, 00000000h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xa5000x4b.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x4e8.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x85540x8600802cd635c3ccf9e6c6a5a898b3b00653False0.5007579291044776data5.776067529058912IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rsrc0xc0000x4e80x60084057f68270633f81b842140f4ba14dfFalse0.451171875data4.126542210541905IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xe0000xc0x20027000fc89ae18356ef90bb167cf49798False0.267578125data2.1918471789870027IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            TimestampSource PortDest PortSource IPDest IP
            Nov 23, 2024 18:29:10.692059040 CET5574453192.168.2.61.1.1.1
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Nov 23, 2024 18:29:10.692059040 CET192.168.2.61.1.1.10x4ab3Standard query (0)tse1.mm.bing.netA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Nov 23, 2024 18:29:09.112019062 CET1.1.1.1192.168.2.60xf61No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
            Nov 23, 2024 18:29:09.112019062 CET1.1.1.1192.168.2.60xf61No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
            Nov 23, 2024 18:29:09.184062004 CET1.1.1.1192.168.2.60xfa1fNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
            Nov 23, 2024 18:29:09.184062004 CET1.1.1.1192.168.2.60xfa1fNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
            Nov 23, 2024 18:29:10.837023973 CET1.1.1.1192.168.2.60x4ab3No error (0)tse1.mm.bing.netmm-mm.bing.net.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
            Nov 23, 2024 18:29:10.837023973 CET1.1.1.1192.168.2.60x4ab3No error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false
            Nov 23, 2024 18:29:10.837023973 CET1.1.1.1192.168.2.60x4ab3No error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false
            No statistics
            No system behavior
            No disassembly